Characterising the fundamental concepts of information security, such as confidentiality and authentication, has proved problematic from the outset and remains controversial to this day. Non-interference was proposed some 25 years ago to give a precise, formal characterisation of the absence of information flows through a system, motivated in large part by the discovery of “covert channels” in access control models such as Bell-LaPadula. Intuitively, it asserts that altering High's interactions with a system should not result in any observable difference in Low's interactions with the system. Superficially it appears to be a very natural and compelling concept but it turns out to harbor some surprising subtleties.
Over the years various models of computation have been used to formalise non-interference. Typically these floundered on non-determinism, ”input/output” distinctions, input totality and so forth. In the late 80's and early 90's, process algebras, in particular CSP, were applied to information security. In this talk I will briefly overview this approach and discuss how the concepts and results from process algebra shed light on these haunted corners of non-interference, including the role of non-determinism, unwinding results, composition, refinement and input/output distinctions. In particular, we argue that the absence of information flow can be characterised in terms of process equivalence, itself a delicate and fundamental concept.
[1]
Dieter Gollmann,et al.
Computer Security — ESORICS 94
,
1994,
Lecture Notes in Computer Science.
[2]
José Meseguer,et al.
Unwinding and Inference Control
,
1984,
1984 IEEE Symposium on Security and Privacy.
[3]
Jim Woodcock,et al.
Non-interference through Determinism
,
1994,
J. Comput. Secur..
[4]
Peter Y. A. Ryan,et al.
A CSP formulation of non-interference and unwinding
,
1991
.
[5]
Frédéric Cuppens,et al.
Computer Security - ESORICS 2000
,
2000,
Lecture Notes in Computer Science.
[6]
Neil Evans,et al.
Analysing Time Dependent Security Properties in CSP Using PVS
,
2000,
ESORICS.
[7]
Steve A. Schneider,et al.
CSP and Anonymity
,
1996,
ESORICS.
[8]
J. Meseguer,et al.
Security Policies and Security Models
,
1982,
1982 IEEE Symposium on Security and Privacy.
[9]
Peter Y. A. Ryan,et al.
Process algebra and non-interference
,
1999,
Proceedings of the 12th IEEE Computer Security Foundations Workshop.